##plugins.themes.academic_pro.article.main##
Abstract
Mobile ad-hoc networks are self forming network without any fixed infrastructure. An ad hoc network does not have fixed infrastructure, it means a network without the standard routing infrastructure like fixed routers and routing backbones. Since the network is self configuring it is prone to security problems [19]. One such aspect is Routing .The most widely used protocol for ad-hoc networks is DSDV and AODV. The routing protocol Ad hoc On Demand Distance Vector  has been built without considering any security mechanisms. In AODV the updates are generated as per demand not on a periodic basis. The freshness of routing in AODV is recognized by the control packet which contains hop-count and sequence field. As the fields are editable, it creates a possible vulnerability that is recurrently abused by malicious nodes to advertise false enhanced routes. To improve the security there are some new mechanisms like hash chains and digital signature. To verify the correct functionality of the protocol it is implemented on NS2 simulator and performed extensive simulations and performance evaluations. This experimentation considers parameters such as packet delivery ratio, control overhead and throughput.
Keywords: AODV,Hashchain,Security,Routing,DigitalSignature##plugins.themes.academic_pro.article.details##
References
[2] Sunil J. Soni, Suketu D. Nayak “Enhancing Security Features & Performance of AODV Protocol under Attack for MANETâ€, 2013 International Conference on IntelligentSystems and Signal Processing (ISSP).
[3] Madhavi, S. and K. Duraiswamy “Flooding attack aware secure aodv†2013.
[4] Er. Kamaljit Kaur, Er. Amanpreet Kaur Chela “Simulation and Review of SAODV NS2 Simulationâ€,IJESRT. February, 2014.
[5] J Rajeshwar, Dr G Narsimha “A Comparative study on secure routing algorithms SAODV and A-SAODV in Mobile Ad hoc Networks (MANET)– The Enhancements of AODV, International Journal of Computers and Technology Volume 3 No 2, December 2012.
[6] Alekha Kumar Mishra, Bibhu Dutta Sahoo “A modified adaptive-saodv prototype for performance enhancement in manetâ€, , April ’09 – September ’09, (IJ-CA-ETS).
[7] Durgesh Wadbude, Vineet Richariya “An Efficient Secure AODV Routing Protocol in MANET “,, (IJEIT) Volume 1, Issue 4, April 2012 .
[8] Savithru Lokanath, Aravind Thayur “Implementation of AODV Protocol and Detection of Malicious Nodes in MANETsâ€, (IJSR), Volume 2 Issue 11, November 2013.
[9] Mr. Suketu D. Nayak, Mr. Ravindra K. Gupta “Sec.AODV for MANETs using MD5 with Cryptographyâ€, IJCTA | July-Aug 2011.
[10] V.K.Taksande, Dr.K.D.Kulat, “Performance Comparison of DSDV, DSR, AODV Protocol with IEEE 802.11 MAC for Chain Topology for Mobile Ad-hoc Network using NS-2â€, IJCA Special Issue on 2nd National Conference- Computing, Communication and Sensor Network†CCSN, 2011.
[11] Basavaraj, Sannakashappanavar, C R. Byrareddy, Ravikumar M. Inamathi “Security Enhancement in AODV Routing Protocol for MANETsâ€, , Int. J. on
[12] Sandhya Khurana Neelima Gupta Nagender Aneja “Reliable Ad-hoc On-demand Distance Vector Routing Protocolâ€, 2006 IEEE.
[13] The Network Simulator – NS2. (http://www.isi.edu/nsnam/ns/index.html).
[14] The NS Manual, http://www.isi.edu/nsnam/ns.
[15] MANET,.http://www.ietf.org/html.charters/manet charter.
[16] Yuxia Lin, A. Hamed Mohsenian Rad,Vincent W.S. Wong, Joo-Han Song WMuNeP’05,“Experimental Comparisons between SAODV and AODV Routing Protocols, , October 13.
[17] Eitan Altman, Tania Jimenez; NS Simulators for Beginners; lecture notes 2003-2004.
[18] Mustafa Jasim AL-Jubori, Prof. S. S. Pawale,Prof. S. R. Shinde “Efficient Ad-Hoc On-demand Distance Vector Routing Protocol using Link State Algorithmâ€, Vol 26– No.2, July 2011.